CN116887258A - Wireless access method based on multiple pre-shared keys and storage medium - Google Patents

Wireless access method based on multiple pre-shared keys and storage medium Download PDF

Info

Publication number
CN116887258A
CN116887258A CN202310914717.6A CN202310914717A CN116887258A CN 116887258 A CN116887258 A CN 116887258A CN 202310914717 A CN202310914717 A CN 202310914717A CN 116887258 A CN116887258 A CN 116887258A
Authority
CN
China
Prior art keywords
key
wireless access
random number
unicast
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310914717.6A
Other languages
Chinese (zh)
Inventor
周可
常志民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hua Xinaotian Network Technology Co ltd
Original Assignee
Beijing Hua Xinaotian Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hua Xinaotian Network Technology Co ltd filed Critical Beijing Hua Xinaotian Network Technology Co ltd
Priority to CN202310914717.6A priority Critical patent/CN116887258A/en
Publication of CN116887258A publication Critical patent/CN116887258A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Abstract

The invention relates to the technical field of wireless access, in particular to a wireless access method and a storage medium based on multiple pre-shared keys, wherein the method comprises the following steps: step A1: the wireless access point generates and transmits a first random number to enable the terminal equipment to generate a unicast dual key; step A2: receiving a second random number and a key check code returned by the terminal equipment, and respectively generating a plurality of keys to be checked; step A3: sequentially comparing the keys to be checked according to the key check codes to determine a pre-shared key adopted by the terminal equipment, and installing unicast dual keys; the beneficial effects are that: the wireless access point can check a plurality of groups of pre-shared secret keys in the process of handshake so as to determine the pre-shared secret key actually adopted by the terminal equipment side, further determine the access identity of the terminal equipment and configure corresponding access strategies. The whole authentication process is greatly shortened, and the use experience is improved.

Description

Wireless access method based on multiple pre-shared keys and storage medium
Technical Field
The invention relates to the technical field of wireless access, in particular to a wireless access method based on multiple pre-shared keys and a storage medium.
Background
WLAN is Wireless Local Area Network, and is simply called wireless local area network, which uses wireless communication technology to interconnect computer devices to form a network system capable of communicating with each other and realizing resource sharing. In the system, in order to realize the processes of authentication, security verification, access policy control and the like of the access equipment, the access equipment is generally managed by adopting the technologies of WPA/WPA2-PSK key verification, virtual local area network, portal authentication, visitor network and the like.
In the prior art, there are many wireless access systems implemented based on the above technology. For example, chinese patent CN201580004323.0 discloses a positioning sensing forced visitor portal, which determines a wireless access point capable of processing the access request by acquiring a physical position when a terminal device accesses the forced visitor portal, and pushes a corresponding portal page to perform authentication, thereby realizing better identification of visitor identity, and facilitating pushing different advertisement contents to the terminal.
However, in the practical implementation process, the inventor finds that the above scheme generally needs to feed back the portal page for verification after the terminal device is accessed during the access, or different virtual network segments are created by the access point and the visitor network is accessed, which results in the problems of complicated and lengthy authentication process for the user identity.
Disclosure of Invention
Aiming at the problems in the prior art, a wireless access method based on multiple pre-shared keys is provided; in another aspect, a storage medium for implementing the wireless access method is also provided.
The specific technical scheme is as follows:
the wireless access method based on the multiple pre-shared keys is suitable for wireless access points, the wireless access points are used for accessing terminal equipment, multiple groups of pre-shared keys are pre-configured, and each group of pre-shared keys corresponds to different access identities respectively;
the wireless access method comprises the following steps:
step A1: when the terminal equipment initiates access, the wireless access point generates and transmits a first random number so that the terminal equipment generates a unicast dual key;
step A2: receiving a second random number and a key verification code returned by the terminal equipment, and respectively generating a plurality of keys to be verified according to the second random number and each group of the pre-shared keys;
step A3: comparing the keys to be checked in sequence according to the key check codes to determine the pre-shared key adopted by the terminal equipment, and taking the matched keys to be checked as the local unicast dual keys;
step A4: carrying out handshake authentication on the terminal equipment, and then installing the unicast dual key;
step A5: and in the communication process of the terminal equipment, the access identity corresponding to the pre-shared key is adopted to control the access strategy of the terminal equipment.
In another aspect, the step A3 includes:
step A31: intercepting a key check code to be checked for the key to be checked respectively;
step A32: comparing the key check codes with the key check codes to be checked one by one to determine matched key check codes to be checked;
step A33: and taking the corresponding key to be verified as the unicast dual key, and determining the corresponding pre-shared key according to the key to be verified.
On the other hand, when the matched key to be verified does not exist in the step A3, the access process of the terminal equipment is stopped.
In another aspect, the step A4 includes:
step A41: generating a handshake check value by adopting the unicast dual key, and sending the handshake check value to the terminal equipment;
step A42: and receiving a notification message fed back by the terminal equipment, and then locally installing the unicast dual-key.
On the other hand, before performing the step A1, configuring the pre-shared key on a remote server;
in step A2, the wireless access point sends the pre-shared key to the remote server to obtain the key to be verified.
A wireless access method based on multiple pre-shared keys is applicable to terminal equipment, and comprises the following steps:
step B1: initiating an access request to a wireless access point to acquire a first random number fed back by the wireless access point, and generating a unicast dual key based on the first random number, a locally generated second random number and an input pre-shared key;
step B2: generating a key check code according to the unicast dual key, and transmitting the second random number and the key check code to the wireless access point;
step B3: performing handshake authentication according to the message fed back by the wireless access point, and then performing access;
before executing step B1, determining the pre-shared key input to the terminal device according to the access identity corresponding to the terminal device.
In another aspect, the step B2 includes:
step B21: intercepting a key head byte group for the unicast dual key;
step B22: and generating the key check code according to the key head byte group, splicing the key check code and the second random number, and then sending the second random number to the wireless access point.
In another aspect, the step B3 includes:
step B31: receiving a first message sent by the wireless access point, and acquiring a handshake check value from the first message;
step B32: adopting the unicast dual key to verify the handshake verification value, and locally installing the unicast dual key after the verification is passed;
step B33: a notification message is sent to the wireless access point and the communication process is then started.
On the other hand, before the terminal equipment requests access, the terminal equipment sends a first hardware address to the wireless access point in advance, and the wireless access point sends a second hardware address to the terminal equipment;
the terminal device generates the unicast dual key according to the first hardware address, the second hardware address, the first random number, the second random number and the pre-shared key;
or the wireless access point generates the key to be verified according to the first hardware address, the second hardware address, the first random number, the second random number and the pre-shared key.
A storage medium having stored therein computer instructions which, when read and executed by a processor, perform the wireless access method described above.
The technical scheme has the following advantages or beneficial effects:
aiming at the problem that the wireless local area network system in the prior art has complicated identity authentication process of the terminal equipment and poor experience, the scheme improves the handshake protocol of the wireless local area network, so that a wireless access point can check a plurality of groups of pre-shared secret keys in the handshake process to determine the pre-shared secret keys actually adopted by the terminal equipment side, further determine the access identity of the terminal equipment and configure corresponding access strategies. When the process is implemented, only the pre-shared secret key distributed to the terminal equipment is required to be controlled, other authentication methods such as portal authentication, visitor network and the like are not required to be introduced, the whole access and authentication process is not perceived by a user, the whole authentication process is greatly shortened, and the use experience is improved.
Drawings
Embodiments of the present invention will now be described more fully with reference to the accompanying drawings. The drawings, however, are for illustration and description only and are not intended as a definition of the limits of the invention.
Fig. 1 is a schematic diagram of an access method of a wireless access point according to an embodiment of the present invention;
FIG. 2 is a schematic diagram showing the sub-steps of step A3 in an embodiment of the present invention;
FIG. 3 is a schematic diagram of the sub-step of step A4 in the embodiment of the present invention;
fig. 4 is a schematic diagram of a terminal device access method in an embodiment of the present invention;
FIG. 5 is a schematic diagram showing the sub-steps of step B2 in an embodiment of the present invention;
fig. 6 is a schematic diagram of the substep of step B3 in the embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other.
The invention is further described below with reference to the drawings and specific examples, which are not intended to be limiting.
The invention comprises the following steps:
the wireless access method based on the multiple pre-shared keys is suitable for wireless access points, the wireless access points are used for accessing terminal equipment, multiple groups of pre-shared keys are pre-configured, and each group of pre-shared keys corresponds to different access identities respectively;
as shown in fig. 1, the wireless access method includes:
step A1: when the terminal equipment initiates access, the wireless access point generates and transmits a first random number so that the terminal equipment generates a unicast dual key;
step A2: receiving a second random number and a key verification code returned by the terminal equipment, and respectively generating a plurality of keys to be verified according to the second random number and each group of pre-shared keys;
step A3: sequentially comparing the keys to be checked according to the key check codes to determine a pre-shared key adopted by the terminal equipment, and taking the matched key to be checked as a local unicast dual key;
step A4: carrying out handshake authentication on terminal equipment, and then installing a unicast dual key;
step A5: and in the communication process of the terminal equipment, the access strategy of the terminal equipment is controlled by adopting the access identity corresponding to the pre-shared secret key.
Specifically, in the embodiment, multiple groups of pre-shared keys are pre-configured on the wireless access point side, and corresponding pre-shared keys are distributed for specific terminal equipment, so as to solve the problem that the wireless local area network system in the prior art has complicated identity authentication process of the terminal equipment and is poor in experience. When in actual access, the wireless access point generates a first random number (ANonce) according to the relevant standard of the four-way handshake protocol and sends the first random number (ANonce) to one side of the terminal equipment; the terminal device then generates a unicast dual key (PTK) according to the first hardware address (MAC) corresponding to the terminal device, the second hardware address corresponding to the wireless access point, the received first random number, the locally generated second random number (SNonce) and the pre-shared key (PSK) readable in the previous message, the unicast dual key being used for encrypting unicast data after the four-way handshake has passed; the terminal device then processes the unicast dual key to generate a key check code and sends the key check code to the wireless access point along with the second random number. Because the wireless access point has acquired the first hardware address, the second hardware address and the locally generated first random number in the previous message process, multiple groups of keys to be verified can be sequentially generated according to the pre-stored pre-shared key. Then, the wireless access point can determine the unicast dual key actually generated corresponding to the terminal equipment side according to the key check code, and at the same time, determine the pre-shared key input by the terminal equipment side, so as to judge the access identity of the terminal equipment. And then, carrying out handshake authentication between the wireless access point and the terminal equipment according to a related protocol, thereby determining consistency of unicast dual keys respectively generated by the two parties and completing a handshake process. The terminal device may have network access. Meanwhile, the terminal equipment controls the access strategy of the terminal equipment according to the previously identified access identity. The process only needs to control the pre-shared secret key distributed to the terminal equipment, other authentication methods are not needed to be introduced, the user does not feel, the whole authentication flow is greatly shortened, and the use experience is improved.
In the implementation process, the wireless Access method is mainly configured at the wireless Access Point (AP) side and is used for interacting with terminal equipment (also called Station, STA) to realize the handshake authentication process of the WPA/WPA2-PSK mode. The pre-shared key refers to PSK, pre-shared key, which is pre-stored in the wireless access point and distributed to corresponding terminal equipment for access as required. The access policy is information which is preconfigured on the wireless access point side and is used for controlling access behaviors of different terminal devices, and comprises maximum access duration, specified device hardware addresses, network rates, allocated virtual network segments, allowed access quantity and the like. In general, a pre-shared key corresponds to a group of users, each of which is assigned a respective access rule to be collocated to form the access policy described above. The key to be checked refers to a key corresponding to a unicast dual key calculated by the wireless access point by adopting the same method as the terminal equipment side, the number of the keys corresponds to the pre-shared key one by one, and the keys need to be screened to determine the actual unicast dual key. The wireless access method is only an access process of the terminal equipment in an ideal state, but in an actual access process, a handshake process cannot be continuously executed due to non-response of a peer end and unequal factors of key matching, and the current access process is stopped at the moment.
In one embodiment, before the terminal device requests access, the terminal device sends a first hardware address to the wireless access point in advance, and the wireless access point sends a second hardware address to the terminal device;
the terminal device generates a unicast dual key according to the first hardware address, the second hardware address, the first random number, the second random number and the pre-shared key;
alternatively, the wireless access point generates the key to be verified in accordance with the first hardware address, the second hardware address, the first random number, the second random number, and the pre-shared key.
In one embodiment, as shown in fig. 2, step A3 includes:
step A31: intercepting a key check code to be checked from the key to be checked respectively;
step A32: comparing the key check codes with the key check codes to be checked one by one to determine matched key check codes to be checked;
step A33: and taking the corresponding key to be verified as a unicast dual key, and determining the corresponding pre-shared key according to the key to be verified.
Specifically, in order to achieve a better matching effect, in this embodiment, for a key to be verified, the first 16 bytes KCK (MIC key) and the 802.1x data frame (EAPOL packet) of the key to be verified are intercepted respectively to calculate MIC values as the key verification code to be verified; the calculation mode of the key check code to be checked is consistent with the mode of generating the key check code at the terminal equipment side. And then comparing the key check code with the key check code to be checked one by one, determining the matched key to be checked as a unicast dual key, and generating a pre-shared key of the key to be checked, thereby realizing the process of distinguishing the access identity.
In one embodiment, when in step A3 there is no matching key to be verified, the access procedure of the terminal device is aborted.
In one embodiment, as shown in fig. 3, step A4 includes:
step A41: generating a handshake check value by adopting a unicast dual key, and sending the handshake check value to the terminal equipment;
step A42: and receiving a notification message fed back by the terminal equipment, and then locally installing the unicast dual key.
Specifically, to ensure consistency of unicast dual keys respectively generated by the terminal device and the wireless access point, in this embodiment, the wireless access point side generates a GTK according to the GMK first, the first random number and the second hardware address corresponding to the wireless access point according to a normal algorithm flow, and then encrypts the GTK by using the locally generated KEK of 16 bytes in the middle of the unicast dual key; meanwhile, the first 16 bytes KCK and EAPOL messages of the unicast dual key are adopted to generate a handshake check value; after the handshake check value is generated, informing the terminal equipment that the handshake is successful; and then, waiting for the terminal equipment to verify the data packet for transmitting the handshake check value, and if the terminal equipment is verified consistently, generating a corresponding notification message, wherein the unicast dual key can be actually installed by both sides.
In one embodiment, the pre-shared key is configured on the remote server prior to performing step A1;
in step A2, the wireless access point sends the second random number and the key check code sum to the remote server to obtain the key to be checked.
Specifically, in order to improve the verification efficiency and provide richer access policy management, in this embodiment, the pre-shared key is set on the remote server; when the terminal equipment is accessed, the wireless access point forwards the related message containing the second random number and the key check code to the remote server, the remote server respectively generates a plurality of groups of keys to be checked according to the pre-shared key, then the keys are compared, the corresponding unicast dual keys and the access identities are screened and returned to the wireless access point, and therefore the matching efficiency of the plurality of groups of unicast dual keys is improved.
The wireless access method based on the multi-preshared key is suitable for the terminal equipment, as shown in fig. 4, and comprises the following steps:
step B1: an access request is sent to a wireless access point to acquire a first random number fed back by the wireless access point, and a unicast dual key is generated based on the first random number, a locally generated second random number and an input pre-shared key;
step B2: generating a key check code according to the unicast dual key, and transmitting a second random number and the key check code to the wireless access point;
step B3: carrying out handshake authentication according to a message fed back by the wireless access point, and then accessing;
before executing step B1, determining the pre-shared key input to the terminal device according to the access identity corresponding to the terminal device.
Specifically, after the wireless access point adopts the wireless access method, the terminal device can implement an access process according to a corresponding flow. When the terminal equipment needs to be accessed, sending an access request to the wireless access point according to the related protocol requirement, and simultaneously generating a second random number locally; and then generating a unicast dual key according to the first hardware address, the second hardware address, the first random number, the second random number and the pre-shared key, generating a key check code according to the unicast dual key, attaching the key check code to the tail of the data packet, and transmitting the data packet to the wireless access point. Then, the wireless access point side generates a plurality of keys to be checked according to the flow and compares the keys with the key check code. The terminal equipment can complete the access only by waiting for the feedback message of the wireless access point and continuing the handshake authentication. Because the pre-shared secret key which can be acquired by the terminal equipment is controlled in advance, the wireless access point side can automatically judge the access identity and allocate the access strategy when in actual access.
In one embodiment, as shown in fig. 5, step B2 includes:
step B21: intercepting a key head byte group for a unicast dual key;
step B22: and generating a key check code according to the key head byte group, splicing the key check code and the second random number, and then sending the spliced key check code and the second random number to the wireless access point.
Specifically, in order to implement the first handshake authentication process, in this embodiment, after generating a unicast dual key, the first 16 bytes KCK and the 802.1x data frame of the unicast dual key are extracted and calculated to obtain a key check code; and then, splicing the key check code and the second random number, attaching the key check code to the packet tail and sending the packet tail to the wireless access point, so that the wireless access point can realize a corresponding check process.
In one embodiment, as shown in fig. 6, step B3 includes:
step B31: receiving a first message sent by a wireless access point, and acquiring a handshake check value from the first message;
step B32: adopting a unicast dual key to verify the handshake verification value, and locally installing the unicast dual key after verification is passed;
step B33: a notification message is sent to the wireless access point and the communication process is then started.
Specifically, in order to ensure consistency of unicast dual keys respectively generated by the terminal device and the wireless access point, in this embodiment, after the wireless access point side generates the unicast dual key according to a corresponding flow, calculates a handshake check value and constructs a first message, the terminal device extracts the handshake check value from the received first message; then, adopting a local unicast dual key to verify the handshake verification value, and judging whether the unicast dual keys at two sides are consistent; if the two keys are consistent, a notification message is sent based on the ACK message, and the two parties install the correct unicast dual keys to start the communication process.
A storage medium having stored therein computer instructions which, when read and executed by a processor, perform the wireless access method described above.
The foregoing is merely illustrative of the preferred embodiments of the present invention and is not intended to limit the embodiments and scope of the present invention, and it should be appreciated by those skilled in the art that equivalent substitutions and obvious variations may be made using the description and illustrations of the present invention, and are intended to be included in the scope of the present invention.

Claims (10)

1. The wireless access method based on the multi-preshared key is suitable for a wireless access point and is characterized in that the wireless access point is used for terminal equipment to access, and a plurality of groups of preshared keys are preconfigured, wherein each group of preshared keys corresponds to different access identities respectively;
the wireless access method comprises the following steps:
step A1: when the terminal equipment initiates access, the wireless access point generates and transmits a first random number so that the terminal equipment generates a unicast dual key;
step A2: receiving a second random number and a key verification code returned by the terminal equipment, and respectively generating a plurality of keys to be verified according to the second random number and each group of the pre-shared keys;
step A3: comparing the keys to be checked in sequence according to the key check codes to determine the pre-shared key adopted by the terminal equipment, and taking the matched keys to be checked as the local unicast dual keys;
step A4: carrying out handshake authentication on the terminal equipment, and then installing the unicast dual key;
step A5: and in the communication process of the terminal equipment, the access identity corresponding to the pre-shared key is adopted to control the access strategy of the terminal equipment.
2. The wireless access method according to claim 1, wherein the step A3 includes:
step A31: intercepting a key check code to be checked for the key to be checked respectively;
step A32: comparing the key check codes with the key check codes to be checked one by one to determine matched key check codes to be checked;
step A33: and taking the corresponding key to be verified as the unicast dual key, and determining the corresponding pre-shared key according to the key to be verified.
3. The wireless access method according to claim 1, wherein the access procedure of the terminal device is aborted when there is no matching key to be checked in step A3.
4. The wireless access method according to claim 1, wherein the step A4 includes:
step A41: generating a handshake check value by adopting the unicast dual key, and sending the handshake check value to the terminal equipment;
step A42: and receiving a notification message fed back by the terminal equipment, and then locally installing the unicast dual-key.
5. The wireless access method of claim 1, wherein the pre-shared key is configured on a remote server prior to performing the step A1;
in the step A2, the wireless access point sends the second random number and the key verification code to the remote server to obtain the key to be verified.
6. A wireless access method based on multiple pre-shared keys, which is applicable to a terminal device, and is characterized by comprising the following steps:
step B1: initiating an access request to a wireless access point to acquire a first random number fed back by the wireless access point, and generating a unicast dual key based on the first random number, a locally generated second random number and an input pre-shared key;
step B2: generating a key check code according to the unicast dual key, and transmitting the second random number and the key check code to the wireless access point;
step B3: performing handshake authentication according to the message fed back by the wireless access point, and then performing access;
before executing step B1, determining the pre-shared key input to the terminal device according to the access identity corresponding to the terminal device.
7. The wireless access method according to claim 6, wherein the step B2 comprises:
step B21: intercepting a key head byte group for the unicast dual key;
step B22: and generating the key check code according to the key head byte group, splicing the key check code and the second random number, and then sending the second random number to the wireless access point.
8. The wireless access method according to claim 6, wherein the step B3 includes:
step B31: receiving a first message sent by the wireless access point, and acquiring a handshake check value from the first message;
step B32: adopting the unicast dual key to verify the handshake verification value, and locally installing the unicast dual key after the verification is passed;
step B33: a notification message is sent to the wireless access point and the communication process is then started.
9. The wireless access method according to any one of claims 1-8, wherein the terminal device has previously sent a first hardware address to the wireless access point and the wireless access point has sent a second hardware address to the terminal device before the terminal device requests access;
the terminal device generates the unicast dual key according to the first hardware address, the second hardware address, the first random number, the second random number and the pre-shared key;
or the wireless access point generates the key to be verified according to the first hardware address, the second hardware address, the first random number, the second random number and the pre-shared key.
10. A storage medium having stored therein computer instructions, which when read and executed by a processor, perform the radio access method of any of claims 1-8.
CN202310914717.6A 2023-07-24 2023-07-24 Wireless access method based on multiple pre-shared keys and storage medium Pending CN116887258A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310914717.6A CN116887258A (en) 2023-07-24 2023-07-24 Wireless access method based on multiple pre-shared keys and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310914717.6A CN116887258A (en) 2023-07-24 2023-07-24 Wireless access method based on multiple pre-shared keys and storage medium

Publications (1)

Publication Number Publication Date
CN116887258A true CN116887258A (en) 2023-10-13

Family

ID=88266074

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310914717.6A Pending CN116887258A (en) 2023-07-24 2023-07-24 Wireless access method based on multiple pre-shared keys and storage medium

Country Status (1)

Country Link
CN (1) CN116887258A (en)

Similar Documents

Publication Publication Date Title
US10027664B2 (en) Secure simple enrollment
RU2696208C1 (en) Method and device for wireless devices authentication
JP6612358B2 (en) Method, network access device, application server, and non-volatile computer readable storage medium for causing a network access device to access a wireless network access point
US10841784B2 (en) Authentication and key agreement in communication network
EP2343917B1 (en) Method, system and device for implementing device addition in the wi-fi device to device network
US20180167389A1 (en) Dynamically generated ssid
US9843575B2 (en) Wireless network authentication method and wireless network authentication apparatus
EP1869822B1 (en) Method and device for multi-session establishment
US20090100262A1 (en) Apparatus and method for detecting duplication of portable subscriber station in portable internet system
WO2022127434A1 (en) Wireless local area network authentication method and apparatus, and electronic device and storage medium
CN111869249A (en) Safe BLE JUST WORKS pairing method for man-in-the-middle attack
CN110933484A (en) Management method and device of wireless screen projection equipment
US9443069B1 (en) Verification platform having interface adapted for communication with verification agent
US20230076147A1 (en) Method and apparatus for authenticating terminal, computer device and storage medium
CN112312393A (en) 5G application access authentication method and 5G application access authentication network architecture
EP2993933A1 (en) Wireless terminal configuration method, apparatus and wireless terminal
KR100523058B1 (en) Apparatus and Method of Dynamic Group Key Management in Wireless Local Area Network System
US8321676B2 (en) Method for establishing a secure ad hoc wireless LAN
CN111031540B (en) Wireless network connection method and computer storage medium
CN109561431B (en) WLAN access control system and method based on multi-password identity authentication
US9622075B2 (en) System and method for adaptive multifactor authentication
CN115473655B (en) Terminal authentication method, device and storage medium for access network
CN111866881A (en) Wireless local area network authentication method and wireless local area network connection method
JP7312279B2 (en) MOBILE NETWORK ACCESS SYSTEM, METHOD, STORAGE MEDIUM AND ELECTRONIC DEVICE
CN116887258A (en) Wireless access method based on multiple pre-shared keys and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination